US8169633B2 - Method and apparatus for attempted secure print job release notification - Google Patents
Method and apparatus for attempted secure print job release notification Download PDFInfo
- Publication number
- US8169633B2 US8169633B2 US12/207,090 US20709008A US8169633B2 US 8169633 B2 US8169633 B2 US 8169633B2 US 20709008 A US20709008 A US 20709008A US 8169633 B2 US8169633 B2 US 8169633B2
- Authority
- US
- United States
- Prior art keywords
- user
- secure print
- print job
- image production
- secure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1237—Print job management
- G06F3/1238—Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1203—Improving or facilitating administration, e.g. print management
- G06F3/1207—Improving or facilitating administration, e.g. print management resulting in the user being informed about print result after a job submission
Definitions
- Disclosed herein are a method and apparatus for attempted secure print job release notification from an image production device.
- the secure print feature may allow users to protect a confidential document that they may not want others to view or take, by requiring the user to be at the image production device when the print job prints out. In most cases, the user selects this function, and then walks to the device to release the job. However, some users may leave the print job on the device for an extended period of time (e.g., forget about the print job, send it to the wrong printer, etc.).
- the print job will stay resident on the image production device until it is either released or deleted by the authorized user at the image production device user interface or manually deleted by a system administrator.
- the issue with this implementation is that the user does not control or receive any notification of any attempts to release or delete their secure print job(s) while he or she is not present at the image production device. This issue may pose a security risk depending upon the security policies of the organization.
- a method and apparatus for notifying a user of an attempted secure print job release from an image production device may include receiving a secure print job and secure print job instructions from a user, wherein the secure print job instructions include at least a pass code and the user's contact information, determining if a pass code has been entered for the user's secure print job, wherein if it is determined that a pass code has been entered for the user's secure print job, determining if the entered pass code is correct, wherein if it is determined that the entered pass code is correct, sending a signal to print the secure print job and notifying the user in accordance with the user's contact information that the secure print job has been printed, otherwise, notifying the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.
- FIG. 1 is an exemplary diagram of an image production environment in accordance with one possible embodiment of the disclosure
- FIG. 2 is an exemplary block diagram of an image production device in accordance with one possible embodiment of the disclosure
- FIG. 3 is a flowchart of an exemplary attempted secure print job release notification process in accordance with one possible embodiment of the disclosure.
- FIGS. 4A and 4B are diagrams of exemplary secure print job user interfaces in accordance with one possible embodiment of the disclosure.
- aspects of the embodiments disclosed herein relate to a method and apparatus for attempted secure print job release notification from an image production device.
- the disclosed embodiments may include a method for notifying a user of an attempted secure print job release from an image production device.
- the method may include receiving a secure print job and secure print job instructions from a user, wherein the secure print job instructions include at least a pass code and the user's contact information, determining if a pass code has been entered for the user's secure print job, wherein if it is determined that a pass code has been entered for the user's secure print job, determining if the entered pass code is correct, wherein if it is determined that the entered pass code is correct, sending a signal to print the secure print job and notifying the user in accordance with the user's contact information that the secure print job has been printed, otherwise, notifying the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.
- the disclosed embodiments may further include an image production device that may include a memory, and a secure print manager that receives a secure print job and secure print job instructions from a user and stores the secure print job in the memory, wherein the secure print job instructions include at least a pass code and the user's contact information, determines if a pass code has been entered for the user's secure print job, wherein if the secure print manager determines that a pass code has been entered for the user's secure print job, the secure print manager determines if the entered pass code is correct, wherein if the secure print manager determines that the entered pass code is correct, the secure print manager sends a signal to print the secure print job and notifies the user in accordance with the user's contact information that the secure print job has been printed, otherwise, the secure print manager notifies the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.
- an image production device may include a memory, and a secure print manager that receives a secure print job and secure print
- the disclosed embodiments may further include a method for notifying a user of an attempted secure print job release from an image production device.
- the method may include receiving a secure print job and secure print job instructions from a user, wherein the secure print job instructions include at least a pass code and the user's contact information, receiving identification information of an image production device operator, determining if a pass code has been entered for the user's secure print job, wherein if it is determined that a pass code has been entered for the user's secure print job, determining if the entered pass code is correct, wherein if it is determined that the entered pass code is correct, retrieving the user's stored profile, determining if the image production device operator is identified as an authorized user in the user's profile, wherein if it is determined that the image production device operator is identified as an authorized user, sending a signal to print the secure print job and notifying the user in accordance with the user's contact information that the secure print job has been printed, otherwise, notifying the user in accordance with the user's contact information
- the disclosed embodiments may concern adding an option to allow a user to receive an alert notification if their remote secure print job, which requires a local pass code on an image production device to be released, has been attempted to be and/or has been released.
- the notification can be via e-mail, telephone, text message, instant message, web site, personal computer alert, pager, etc.
- This function may be used in conjunction with other secure print job security functions including a function which may allow the authorized user to select a time period (for example 1 hour) after which their secure print job may be automatically deleted by the local device if it has not been released/deleted by an authorized user.
- This function may be accomplished via extending the functionality of the current secure print driver dialog box (refer to example dialog box on next page). The user may have the option to vary the time for each individual secure print job.
- FIG. 1 is an exemplary diagram of an image production environment 100 in accordance with one possible embodiment of the disclosure.
- the image production environment 100 may include a processing device 110 that may be hardwired or wirelessly connected to an image production device 120 .
- the processing device 110 may be any device capable to sending a print job to an image production device 120 , including a computer, a server, a telephone, or a personal digital assistant, for example.
- the image production device 120 may be any device that may be capable of printing documents, including a printer, a copier/printer, an office copier/printer, a high-capacity copier/printer, a commercial copier/printer, a facsimile/printer device, or a multi-function device, for example.
- FIG. 2 is an exemplary block diagram of an image production device 120 in accordance with one possible embodiment of the disclosure.
- the image production device 120 may include a bus 210 , a processor 220 , a memory 230 , a read only memory (ROM 240 , a secure print manager 250 , an output section 260 , a user interface 270 , a communication interface 280 , and an image production section 290 .
- Bus 210 may permit communication among the components of the image production device 120 .
- Processor 220 may include at least one conventional processor or microprocessor that interprets and executes instructions.
- Memory 230 may be a random access memory (RAM) or another type of dynamic storage device that stores information and instructions for execution by processor 220 .
- Memory 230 may also include a read-only memory (ROM) which may include a conventional ROM device or another type of static storage device that stores static information and instructions for processor 220 .
- ROM read-only memory
- Communication interface 280 may include any mechanism that facilitates communication via a network.
- communication interface 280 may include a modem.
- communication interface 280 may include other mechanisms for assisting in communications with other devices and/or systems.
- ROM 240 may include a conventional ROM device or another type of static storage device that stores static information and instructions for processor 220 .
- a storage device may augment the ROM and may include any type of storage media, such as, for example, magnetic or optical recording media and its corresponding drive.
- User interface 270 may include one or more conventional mechanisms that permit a user to input information to and interact with the image production unit 100 , such as a keyboard, a display, a mouse, a pen, a voice recognition device, touchpad, buttons, etc., for example.
- Output section 260 may include one or more conventional mechanisms that output image production documents to the user, including output trays, output paths, finishing section, etc., for example.
- the image production section 290 may include an image printing section, a scanner, a fuser section, a toner section, etc., for example.
- the image production device 120 may perform such functions in response to processor 220 by executing sequences of instructions contained in a computer-readable medium, such as, for example, memory 230 . Such instructions may be read into memory 230 from another computer-readable medium, such as a storage device or from a separate device via communication interface 280 .
- the image production device 120 illustrated in FIGS. 1-2 and the related discussion are intended to provide a brief, general description of a suitable communication and processing environment in which the disclosure may be implemented. Although not required, the disclosure will be described, at least in part, in the general context of computer-executable instructions, such as program modules, being executed by the image production device 120 , such as a communication server, communications switch, communications router, or general purpose computer, for example.
- computer-executable instructions such as program modules
- program modules include routine programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
- program modules include routine programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
- program modules include routine programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
- program modules include routine programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
- program modules include routine programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
- program modules include routine programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
- FIG. 3 For illustrative purposes, the operation of the secure print manager 250 and the exemplary attempted secure print job release notification process are described in FIG. 3 in relation to the block diagrams shown in FIGS. 1-2 .
- FIG. 3 is a flowchart of an exemplary attempted secure print job release notification process in accordance with one possible embodiment of the disclosure.
- the process may begin at step 3100 , and continues to step 3200 where the secure print manager 250 may receive a secure print job and secure print job instructions from a user and may store the secure print job in the memory 230 .
- the secure print job instructions may include a pass code and the user's contact information, for example.
- the secure print manager 250 may determine if a pass code has been entered for the user's secure print job. If the secure print manager 250 determines that a pass code has not been entered for the user's secure print job, the process returns to step 3300 , and waits.
- the secure print manager 250 may determine if the entered pass code is correct. If the secure print manager 250 determines that the entered pass code is not correct, then at step 3500 , the secure print manager may notify the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job. In this manner, the secure print manager 250 may notify the user of at least one of the identity of the unauthorized user, the time and date of the unauthorized user attempt, and the location of the unauthorized user attempt, for example. In addition, after one or more unauthorized user attempts to print the secure print job, the secure print manager 250 may delete the secure print job automatically or lock the secure print job for a predetermined time period. The process may then return to step 3300 .
- the secure print manager 250 may send a signal to print the secure print job.
- the secure print manager 250 may notify the user in accordance with the user's contact information that the secure print job has been printed. The process may then go to step 3800 , and end.
- FIGS. 4A and 4B are diagrams of exemplary secure print job user interface screens in accordance with one possible embodiment of the disclosure.
- the secure print job user interfaces 400 , 440 may be presented using a processing device 110 , such as computer, a server, a telephone, or a personal digital assistant, for example, and may include areas where the user can enter secure print job instructions.
- the secure print job user interface 400 may include secure print job instructions such as an area that prompts the user to enter (and confirm) a pass code 410 , and a notification option 420 that prompts the user to select an option to be notified if an unauthorized user attempts to release the secure print job.
- secure print job instructions such as an area that prompts the user to enter (and confirm) a pass code 410
- notification option 420 that prompts the user to select an option to be notified if an unauthorized user attempts to release the secure print job.
- another user interface 440 may pop-up to enter in the appropriate the user's contact information 450 , for example.
- the user's contact information 450 may include a telephone number, an e-mail address, a text message address, a pager number, a personal computer alert message, a web site address, or an instant messenger address, for example.
- the user's contact information may also be pre-stored in memory 230 as part of a user profile and may be presented for verification purposes, for example.
- the secure print manager 250 may prompt the user at the user interface 270 to enter the pass code 410 that the user previously entered using the secure print job user interface 400 and may determine if the pass code is correct. If the secure print manager 250 determines that the pass code is correct, the secure print manager 250 may enable the secure print job to be printed.
- the secure print job may also be released by an authorized person other than the user.
- the secure print manager 250 may receive identification information of an image production device operator.
- the secure print manager 250 may receive the pass code, retrieve the user's stored profile and determine if the image production device operator is identified as an authorized user in the user's profile. If the secure print manager 250 determines that the image production device operator is identified as an authorized user, the secure print manager 250 may send a signal to the print the secure print job and notify the user in accordance with the user's contact information that the secure print job has been printed. If the secure print manager 250 determines that the image production device operator is not identified as an authorized user, the secure print manager 250 may notify the user in accordance with the user's contact information that an unauthorized user attempted to print the secure print job.
- the secure print manager 250 may store information concerning the secure print job in the memory 230 .
- This information may includes the identity of an operator of attempting to release the secure print job from an image production device 120 , the time and date of the operator's attempt, and the location of the operator's attempt.
- the identity of the operator may be established by an identification code, key card, etc., for example.
- the secure print manager 250 may delete the secure print job if the image production device 120 is moved or replaced, for example.
- the secure print manager 250 may determine if the image production device 120 has been moved if it detects that the image production device 120 has acquires a new internet protocol (IP) address (e.g., by comparison to a previous stored IP address) or through the use of sensors, a global positioning system (GPS) device, etc., for example.
- IP internet protocol
- GPS global positioning system
- the user interface 400 may include other options (not shown) including an amount of time that must expire 420 before the image production device 120 deletes the secure print job, for example. If the user does not enter a secure print job expiration time 420 , the secure print manager 250 may set a default secure print job expiration time, chosen by either of an administrator or the manufacturer, for example. In this manner, the secure print manager 250 may delete the secure print job upon expiration of the default secure print job expiration time.
- the secure print manager 250 may send various notifications to the user concerning a secure print job, including that the secure print job that the secure print job has been deleted, for example.
- the processing device 110 may also receive a request from the user to modify the secure print job instructions. In this manner, the processing device 110 may prompt the user to enter the pass code 410 previously entered at the secure print job user interface 400 . If the pass code is entered correctly, the processing device 110 may prompt the user to modify the secure print job instructions. Once the secure print job instructions are modified, they may be sent to the image production device 120 .
- Embodiments as disclosed herein may also include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon.
- Such computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer.
- Such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures.
- a network or another communications connection either hard wired, wireless, or combination thereof
- any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of the computer-readable media.
- Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions.
- Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments.
- program modules include routines, programs, objects, components, and data structures, and the like that perform particular tasks or implement particular abstract data types.
- Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described therein.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
- Facsimiles In General (AREA)
Abstract
Description
Claims (21)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/207,090 US8169633B2 (en) | 2008-07-08 | 2008-09-09 | Method and apparatus for attempted secure print job release notification |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/168,998 US20100007909A1 (en) | 2008-07-08 | 2008-07-08 | Method and apparatus for deleting secure print jobs |
US12/207,090 US8169633B2 (en) | 2008-07-08 | 2008-09-09 | Method and apparatus for attempted secure print job release notification |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/168,998 Continuation-In-Part US20100007909A1 (en) | 2008-07-08 | 2008-07-08 | Method and apparatus for deleting secure print jobs |
Publications (2)
Publication Number | Publication Date |
---|---|
US20100007907A1 US20100007907A1 (en) | 2010-01-14 |
US8169633B2 true US8169633B2 (en) | 2012-05-01 |
Family
ID=41504878
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/207,090 Expired - Fee Related US8169633B2 (en) | 2008-07-08 | 2008-09-09 | Method and apparatus for attempted secure print job release notification |
Country Status (1)
Country | Link |
---|---|
US (1) | US8169633B2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8665463B2 (en) | 2011-02-28 | 2014-03-04 | Xerox Corporation | Sharing common printing passwords among multiple printing devices connected to network |
US9361053B2 (en) | 2013-01-31 | 2016-06-07 | Hewlett-Packard Development Company, L.P. | Confidential-sender email addresses for printing |
US9832034B2 (en) | 2011-07-27 | 2017-11-28 | Honeywell International Inc. | Systems and methods for managing a programmable thermostat |
US9858516B2 (en) | 2013-03-07 | 2018-01-02 | Hewlett-Packard Development Company, L.P. | Secure printing |
US10579313B1 (en) | 2019-03-26 | 2020-03-03 | Zerox Corporation | Method and apparatus for releasing a secure print job between users |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8380889B2 (en) | 2010-03-31 | 2013-02-19 | Oki Data Americas, Inc. | Distributed peripheral device management system |
KR101851658B1 (en) * | 2011-08-18 | 2018-04-25 | 에스프린팅솔루션 주식회사 | Image forming device and information management method of the image forming device |
US9235722B2 (en) | 2012-04-27 | 2016-01-12 | Hewlett-Packard Development Company, L.P.L | Document security |
JP5766665B2 (en) * | 2012-08-01 | 2015-08-19 | 株式会社沖データ | Image processing apparatus, print job management method, and image forming system |
JP6852466B2 (en) * | 2017-03-03 | 2021-03-31 | コニカミノルタ株式会社 | Image-forming equipment, printing systems, and computer-based methods of image forming equipment |
JP2023122804A (en) * | 2022-02-24 | 2023-09-05 | キヤノン株式会社 | Image formation device, control method of image formation device, and program |
US20240247421A1 (en) * | 2023-01-24 | 2024-07-25 | Haier Us Appliance Solutions, Inc. | Domestic appliances and methods of automatic calibration |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020065729A1 (en) * | 2000-11-30 | 2002-05-30 | Guillemin Gustavo M. | Systems and methods for secure printing |
US20020104026A1 (en) * | 2001-01-29 | 2002-08-01 | Robert Barra | Method and apparatus for providing a service to transfer messages over a communications network |
US6567180B1 (en) * | 1998-05-29 | 2003-05-20 | Hitachi Koki Co., Ltd. | Document printing method |
US20030227647A1 (en) * | 2002-06-05 | 2003-12-11 | Microsoft Corporation | System and method for managing printed documents |
US6819445B1 (en) | 2000-01-25 | 2004-11-16 | Xerox Corporation | Digital printing system which retains recent files for rapid output |
US20040246513A1 (en) * | 2003-06-03 | 2004-12-09 | Hewlett-Packard Company | Method and apparatus for crash recovery on an image forming apparatus |
US20050275866A1 (en) * | 2004-05-26 | 2005-12-15 | Dylan Corlett | Methods and apparatus for secure printing |
US20060072149A1 (en) * | 2004-08-03 | 2006-04-06 | Jim Justice | Universal document exchange system and method |
-
2008
- 2008-09-09 US US12/207,090 patent/US8169633B2/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6567180B1 (en) * | 1998-05-29 | 2003-05-20 | Hitachi Koki Co., Ltd. | Document printing method |
US6819445B1 (en) | 2000-01-25 | 2004-11-16 | Xerox Corporation | Digital printing system which retains recent files for rapid output |
US20020065729A1 (en) * | 2000-11-30 | 2002-05-30 | Guillemin Gustavo M. | Systems and methods for secure printing |
US20020104026A1 (en) * | 2001-01-29 | 2002-08-01 | Robert Barra | Method and apparatus for providing a service to transfer messages over a communications network |
US20030227647A1 (en) * | 2002-06-05 | 2003-12-11 | Microsoft Corporation | System and method for managing printed documents |
US20040246513A1 (en) * | 2003-06-03 | 2004-12-09 | Hewlett-Packard Company | Method and apparatus for crash recovery on an image forming apparatus |
US20050275866A1 (en) * | 2004-05-26 | 2005-12-15 | Dylan Corlett | Methods and apparatus for secure printing |
US20060072149A1 (en) * | 2004-08-03 | 2006-04-06 | Jim Justice | Universal document exchange system and method |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8665463B2 (en) | 2011-02-28 | 2014-03-04 | Xerox Corporation | Sharing common printing passwords among multiple printing devices connected to network |
US9832034B2 (en) | 2011-07-27 | 2017-11-28 | Honeywell International Inc. | Systems and methods for managing a programmable thermostat |
US10454702B2 (en) | 2011-07-27 | 2019-10-22 | Ademco Inc. | Systems and methods for managing a programmable thermostat |
US9361053B2 (en) | 2013-01-31 | 2016-06-07 | Hewlett-Packard Development Company, L.P. | Confidential-sender email addresses for printing |
US9858516B2 (en) | 2013-03-07 | 2018-01-02 | Hewlett-Packard Development Company, L.P. | Secure printing |
US10579313B1 (en) | 2019-03-26 | 2020-03-03 | Zerox Corporation | Method and apparatus for releasing a secure print job between users |
Also Published As
Publication number | Publication date |
---|---|
US20100007907A1 (en) | 2010-01-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8169633B2 (en) | Method and apparatus for attempted secure print job release notification | |
KR101424851B1 (en) | Image processing apparatus, method of controlling the same, and storage medium | |
US10136029B2 (en) | Printing apparatus, printing apparatus control method, and program | |
US20100007909A1 (en) | Method and apparatus for deleting secure print jobs | |
US7551319B2 (en) | Printer device, printing method, printing program, and recording medium | |
US9075550B2 (en) | Printing apparatus, printing method, and storage medium | |
US8223354B2 (en) | Printing apparatus capable of performing confidential printing and printing method for use therein | |
US8294550B2 (en) | Authentication system, authentication method, and information processing apparatus | |
US8797573B2 (en) | Image forming apparatus, print data processing method thereof, and recording medium | |
JP4274206B2 (en) | Job processing system, job processing apparatus, job specifying method, and job specifying processing program | |
US20080007780A1 (en) | Printing system, printing control method, and computer readable medium | |
JP5145254B2 (en) | Image forming system, server apparatus, and image forming apparatus | |
KR20130031208A (en) | Printing control apparatus and control method therefor | |
JP4710714B2 (en) | Printing system, printing method, program, and printing apparatus | |
JP4628310B2 (en) | Print control apparatus, print control system, print control method, and program | |
JP2005328322A (en) | Image output device | |
US20150242170A1 (en) | Image forming apparatus, job execution system, and job execution method | |
US10649703B2 (en) | Print control apparatus, control method of a print control apparatus, and recording medium | |
JP4665950B2 (en) | Network printer | |
US20060064738A1 (en) | Device usage information writing apparatus and method thereof, image forming apparatus and device system having the apparatus | |
JP5097749B2 (en) | Image forming system and server device | |
JP2010170235A (en) | Image forming system and server device | |
JP4810849B2 (en) | Document management method, document management program, document management apparatus, and document management system | |
JP2006094067A (en) | Image processor and image processing system | |
JP6340820B2 (en) | Information processing system, information processing method, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: XEROX CORPORATION, CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AIKENS, ANDREW J.;HUANG, ZHUN;REEL/FRAME:021501/0459;SIGNING DATES FROM 20080908 TO 20080909 Owner name: XEROX CORPORATION, CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AIKENS, ANDREW J.;HUANG, ZHUN;SIGNING DATES FROM 20080908 TO 20080909;REEL/FRAME:021501/0459 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: CITIBANK, N.A., AS AGENT, DELAWARE Free format text: SECURITY INTEREST;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:062740/0214 Effective date: 20221107 |
|
AS | Assignment |
Owner name: XEROX CORPORATION, CONNECTICUT Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT R/F 062740/0214;ASSIGNOR:CITIBANK, N.A., AS AGENT;REEL/FRAME:063694/0122 Effective date: 20230517 |
|
AS | Assignment |
Owner name: CITIBANK, N.A., AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:064760/0389 Effective date: 20230621 |
|
AS | Assignment |
Owner name: JEFFERIES FINANCE LLC, AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:065628/0019 Effective date: 20231117 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: XEROX CORPORATION, CONNECTICUT Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT RF 064760/0389;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:068261/0001 Effective date: 20240206 Owner name: CITIBANK, N.A., AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:066741/0001 Effective date: 20240206 |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20240501 |